storj.io/minio@v0.0.0-20230509071714-0cbc90f649b1/cmd/config/identity/openid/validators_test.go (about)

     1  /*
     2   * MinIO Cloud Storage, (C) 2018 MinIO, Inc.
     3   *
     4   * Licensed under the Apache License, Version 2.0 (the "License");
     5   * you may not use this file except in compliance with the License.
     6   * You may obtain a copy of the License at
     7   *
     8   *     http://www.apache.org/licenses/LICENSE-2.0
     9   *
    10   * Unless required by applicable law or agreed to in writing, software
    11   * distributed under the License is distributed on an "AS IS" BASIS,
    12   * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    13   * See the License for the specific language governing permissions and
    14   * limitations under the License.
    15   */
    16  
    17  package openid
    18  
    19  import (
    20  	"net/http"
    21  	"net/http/httptest"
    22  	"testing"
    23  
    24  	xnet "storj.io/minio/pkg/net"
    25  )
    26  
    27  type errorValidator struct{}
    28  
    29  func (e errorValidator) Validate(token, dsecs string) (map[string]interface{}, error) {
    30  	return nil, ErrTokenExpired
    31  }
    32  
    33  func (e errorValidator) ID() ID {
    34  	return "err"
    35  }
    36  
    37  func TestValidators(t *testing.T) {
    38  	ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
    39  		w.Header().Set("content-type", "application/json")
    40  		w.Write([]byte(`{
    41    "keys" : [ {
    42      "kty" : "RSA",
    43      "kid" : "1438289820780",
    44      "use" : "sig",
    45      "alg" : "RS256",
    46      "n" : "idWPro_QiAFOdMsJD163lcDIPogOwXogRo3Pct2MMyeE2GAGqV20Sc8QUbuLDfPl-7Hi9IfFOz--JY6QL5l92eV-GJXkTmidUEooZxIZSp3ghRxLCqlyHeF5LuuM5LPRFDeF4YWFQT_D2eNo_w95g6qYSeOwOwGIfaHa2RMPcQAiM6LX4ot-Z7Po9z0_3ztFa02m3xejEFr2rLRqhFl3FZJaNnwTUk6an6XYsunxMk3Ya3lRaKJReeXeFtfTpShgtPiAl7lIfLJH9h26h2OAlww531DpxHSm1gKXn6bjB0NTC55vJKft4wXoc_0xKZhnWmjQE8d9xE8e1Z3Ll1LYbw",
    47      "e" : "AQAB"
    48    }, {
    49      "kty" : "RSA",
    50      "kid" : "1438289856256",
    51      "use" : "sig",
    52      "alg" : "RS256",
    53      "n" : "zo5cKcbFECeiH8eGx2D-DsFSpjSKbTVlXD6uL5JAy9rYIv7eYEP6vrKeX-x1z70yEdvgk9xbf9alc8siDfAz3rLCknqlqL7XGVAQL0ZP63UceDmD60LHOzMrx4eR6p49B3rxFfjvX2SWSV3-1H6XNyLk_ALbG6bGCFGuWBQzPJB4LMKCrOFq-6jtRKOKWBXYgkYkaYs5dG-3e2ULbq-y2RdgxYh464y_-MuxDQfvUgP787XKfcXP_XjJZvyuOEANjVyJYZSOyhHUlSGJapQ8ztHdF-swsnf7YkePJ2eR9fynWV2ZoMaXOdidgZtGTa4R1Z4BgH2C0hKJiqRy9fB7Gw",
    54      "e" : "AQAB"
    55    } ]
    56  }
    57  `))
    58  		w.(http.Flusher).Flush()
    59  	}))
    60  	defer ts.Close()
    61  
    62  	vrs := NewValidators()
    63  
    64  	if err := vrs.Add(&errorValidator{}); err != nil {
    65  		t.Fatal(err)
    66  	}
    67  
    68  	if err := vrs.Add(&errorValidator{}); err == nil {
    69  		t.Fatal("Unexpected should return error for double inserts")
    70  	}
    71  
    72  	if _, err := vrs.Get("unknown"); err == nil {
    73  		t.Fatal("Unexpected should return error for unknown validators")
    74  	}
    75  
    76  	v, err := vrs.Get("err")
    77  	if err != nil {
    78  		t.Fatal(err)
    79  	}
    80  
    81  	if _, err = v.Validate("", ""); err != ErrTokenExpired {
    82  		t.Fatalf("Expected error %s, got %s", ErrTokenExpired, err)
    83  	}
    84  
    85  	vids := vrs.List()
    86  	if len(vids) == 0 || len(vids) > 1 {
    87  		t.Fatalf("Unexpected number of vids %v", vids)
    88  	}
    89  
    90  	u, err := xnet.ParseHTTPURL(ts.URL)
    91  	if err != nil {
    92  		t.Fatal(err)
    93  	}
    94  
    95  	cfg := Config{}
    96  	cfg.JWKS.URL = u
    97  	if err = vrs.Add(NewJWT(cfg)); err != nil {
    98  		t.Fatal(err)
    99  	}
   100  
   101  	if _, err = vrs.Get("jwt"); err != nil {
   102  		t.Fatal(err)
   103  	}
   104  }